


default search action
18th AIAI 2022: Hersonissos, Crete, Greece
- Ilias Maglogiannis, Lazaros Iliadis, John MacIntyre, Paulo Cortez:
Artificial Intelligence Applications and Innovations - 18th IFIP WG 12.5 International Conference, AIAI 2022, Hersonissos, Crete, Greece, June 17-20, 2022, Proceedings, Part I. IFIP Advances in Information and Communication Technology 646, Springer 2022, ISBN 978-3-031-08332-7
Adaptive Modeling/Cloud Data Models
- Lisa Elderhorst, Melissa van den Berge, Jan Treur
:
A Second-Order Adaptive Decision Model for Proceeding or Terminating a Pregnancy. 3-15 - Michele Della Ventura
:
A Self-adaptive Learning Music Composition Algorithm as Virtual Tutor. 16-26 - Tajwar Mehmood, Seemab Latif
:
Dynamic Big Data Drift Visualization of CPU and Memory Resource Usage in Cloud Computing. 27-36 - Sophie C. F. Hendrikse
, Jan Treur
, Tom F. Wilderjans
, Suzanne Dikker, Sander L. Koole
:
On the Interplay of Interpersonal Synchrony, Short-Term Affiliation and Long-Term Bonding: A Second-Order Multi-adaptive Neural Agent Model. 37-57 - Mourad El Hamri
, Younès Bennani, Issam Falih:
When Domain Adaptation Meets Semi-supervised Learning Through Optimal Transport. 58-69
Cybersecurity Fraud Intrusion/Anomaly Detection
- Ugur Dolu
, Emre Sefer
:
A Novel GBT-Based Approach for Cross-Channel Fraud Detection on Real-World Banking Transactions. 73-84 - Gonçalo Fontes
, Luís Miguel Matos
, Arthur Matta
, André Luiz Pilastri
, Paulo Cortez
:
An Empirical Study on Anomaly Detection Algorithms for Extremely Imbalanced Datasets. 85-95 - Dragos-Vasile Bratu, Rares Stefan Tiberius Ilinoiu, Alexandru Cristea, Maria-Alexandra Zolya, Sorin-Aurel Moraru:
Anomaly Detection Using Edge Computing AI on Low Powered Devices. 96-107 - K. Bennaceur, Zakaria Sahraoui
, Mohamed Ahmed-Nacer:
Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection. 108-115 - Anastasios Panagiotis Psathas
, Lazaros Iliadis
, Antonios Papaleonidas
, Dimitris Bountas
:
HEDL-IDS: A Hybrid Ensemble Deep Learning Approach for Cyber Intrusion Detection. 116-131 - Tijana Markovic
, Miguel Leon
, David Buffoni, Sasikumar Punnekkat
:
Random Forest Based on Federated Learning for Intrusion Detection. 132-144 - Stavros Stavrinos, Konstantinos Kotis
, Christos Kalloniatis
:
Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things. 145-156
Deep Learning - Convolutional
- Sultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim
, Muhammad Rashid
, Zulfiqar Ali, Mohib Ullah, Habib Ullah:
An Efficient Deep Learning Framework for Face Mask Detection in Complex Scenes. 159-169 - Dimitris Tsiktsiris
, Antonios Lalas
, Minas Dasygenis
, Konstantinos Votis
, Dimitrios Tzovaras
:
An Efficient Method for Addressing COVID-19 Proximity Related Issues in Autonomous Shuttles Public Transportation. 170-179 - Olympia Giannou, Dimitra E. Zazara, Anastasios D. Giannou, Petra Clara Arck, Georgios Pavlidis:
Automatic Semi-quantitative Histological Assessment of Tissue Traits Using a Smart Web Application. 180-191 - Hiba Khodji
, Lucille Herbay
, Pierre Collet
, Julie Dawn Thompson, Anne Jeannin-Girardon
:
MERLIN: Identifying Inaccuracies in Multiple Sequence Alignments Using Object Detection. 192-203 - Milan Kresovic, Thong Duy Nguyen, Mohib Ullah, Hina Afridi, Faouzi Alaya Cheikh:
PigPose: A Realtime Framework for Farm Animal Pose Estimation and Tracking. 204-215 - Petr Hájek
:
Speech Emotion Recognition from Earnings Conference Calls in Predicting Corporate Financial Distress. 216-228 - Yasuaki Ito, Koji Nakano
, Akihiko Kasagi:
The Bonsai Hypothesis: An Efficient Network Pruning Technique. 229-241
Deep Learning - Recurrent/Reinforcement
- Anshul Rankawat, Rahul Kumar, Arun Kumar:
Deep Recurrent Neural Networks for OYO Hotels Recommendation. 245-256 - Jianye Pang, Wei Ke:
Fine-Grained Double-View Link Prediction Within the Dynamic Interaction Network. 257-269 - Karim Hamadeh, Julia El Zini, Joudi Hajar, Mariette Awad
:
MTMA-DDPG: A Deep Deterministic Policy Gradient Reinforcement Learning for Multi-task Multi-agent Environments. 270-281 - Manoj Shakya
, Huey Yuen Ng
, Darrell Joshua Ong, Bu-Sung Lee:
Reinforcement Learning Approach for Multi-period Inventory with Stochastic Demand. 282-291 - Franz A. Van-Horenbeke
, Angelika Peer
:
The Neocortex-Inspired Locally Recurrent Neural Network (NILRNN) as a Model of the Primary Visual Cortex. 292-303 - Vasilis Kochliaridis
, Eleftherios Kouloumpris
, Ioannis P. Vlahavas
:
TraderNet-CR: Cryptocurrency Trading with Deep Reinforcement Learning. 304-315 - Wei Liu
, Hui Chen
, Yongqiang Ma
, Jianji Wang
, Nanning Zheng
:
Transformer-Based Zero-Shot Detection via Contrastive Learning. 316-327
Energy Streams Modeling
- K. K. Lykothanasi, Spyros Sioutas
, Kostas Tsichlas
:
Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data Streams. 331-342 - Charalampos M. Liapis, Aikaterini Karanikola, Sotiris Kotsiantis:
Energy Load Forecasting: Investigating Mid-Term Predictions with Ensemble Learners. 343-355 - Christos Konstantopoulos, Spyros Sioutas, Konstantinos Tsichlas:
Machine Learning Techniques for Regression in Energy Disaggregation. 356-366
Evolutionary/Biologically Inspired Modeling and Brain Modeling
- Ryan Yu, Andrew Wood, Sarel Cohen, Moshik Hershcovitch, Daniel G. Waddington, Peter Chin:
Biologically Plausible Complex-Valued Neural Networks and Model Optimization. 369-382 - Julia Garbaruk
, Doina Logofatu
, Florin Leon
:
Comparative Study by Using a Greedy Approach and Advanced Bio-Inspired Strategies in the Context of the Traveling Thief Problem. 383-393 - Haodong Jing, Ming Du, Yongqiang Ma
, Nanning Zheng:
Exploring the Relationship Between Visual Information and Language Semantic Concept in the Human Brain. 394-406 - Ming Du
, Haodong Jing, Yongqiang Ma
, Nanning Zheng
:
Hierarchical Causality Network: Find the Effective Connectivity in Visual Cortex. 407-419 - Dragica Rankovic, Nevena Rankovic
, Mirjana Ivanovic, Ljubomir Lazic:
The Generalization of Selection of an Appropriate Artificial Neural Network to Assess the Effort and Costs of Software Projects. 420-431 - Marc Chevallier
, Nistor Grozavu, Faouzi Boufarès, Nicoleta Rogovschi, Charly Clairmont:
Trade Between Population Size and Mutation Rate for GAAM (Genetic Algorithm with Aggressive Mutation) for Feature Selection. 432-444
Explainable AI/Graph Representation and Processing Frameworks
- Giulia Vilone
, Luca Longo
:
A Novel Human-Centred Evaluation Approach and an Argument-Based Method for Explainable Artificial Intelligence. 447-460 - Alabbas Alhaj Ali, Doina Logofatu:
An Analysis on Graph-Processing Frameworks: Neo4j and Spark GraphX. 461-470 - Hassan B. Kazemian, Mohammad Hossein Amirhosseini, Michael Phillips:
Application of Graph-Based Technique to Identity Resolution. 471-482 - Wilmuth Müller, Dirk Mühlenberg, Dirk Pallmer, Uwe Zeltmann, Christian Ellmauer, Konstantinos P. Demestichas:
Knowledge Engineering and Ontology for Crime Investigation. 483-494 - Ahmed Zaiou, Younès Bennani, Mohamed Hibti, Basarab Matei
:
Quantum Approach for Vertex Separator Problem in Directed Graphs. 495-506 - Mina Ameli
, Viktor Pfanschilling
, Anar Amirli
, Wolfgang Maaß
, Kristian Kersting
:
Unsupervised Multi-sensor Anomaly Localization with Explainable AI. 507-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.